Compare commits
187 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| a73808fc1e | |||
| e225fda908 | |||
| f99e5f1fd2 | |||
| 4a300e9448 | |||
| 9f8c063290 | |||
| 94d5562993 | |||
| 4c9e91bf85 | |||
| 3b988b007b | |||
| 2029e34f7b | |||
| 19ec00985f | |||
| 95af8b30c8 | |||
| 3cd029e81b | |||
| 957da88592 | |||
| 05a4f7a4d9 | |||
| 1a6e6ec818 | |||
| a342512f47 | |||
| 7043e38faa | |||
| 29a91daec3 | |||
| 0821fe16e2 | |||
| 4e4c4a7a07 | |||
| 0b81870af8 | |||
| 8db117a15d | |||
| 3643bd727a | |||
| 7412fc76de | |||
| e099b97bb1 | |||
| 307d20f651 | |||
| e7c2d849e8 | |||
| cb3c1c4649 | |||
| e1d817f09a | |||
| 42420cdc5a | |||
| 1947f634a6 | |||
| 94609cb6c9 | |||
| 541c54d1aa | |||
| b71a4fcf9a | |||
| 4889ac79f0 | |||
| a5f48bdfe9 | |||
| ba4a2286f7 | |||
| 41f23212cf | |||
| 735f5be839 | |||
| 56f754c0ee | |||
| ea5ff24038 | |||
| bc97e58e6b | |||
| a2c6e9a046 | |||
| 10fb89ad72 | |||
| a2cb44a790 | |||
| 7262ae5ec6 | |||
| eecb28096b | |||
| c54692ed15 | |||
| cf8a661173 | |||
| ec8c36a73e | |||
| b77291fa8e | |||
| 03220f4332 | |||
| 422790edcd | |||
| c8f88bb40a | |||
| 18cd5a388d | |||
| 4547c21cba | |||
| 61a4fabac9 | |||
| 8d57596072 | |||
| 4d072450c0 | |||
| 16be62b878 | |||
| 1853f2ff28 | |||
| 5ff6d190c3 | |||
| 9e7f59606c | |||
| a70a362ce4 | |||
| 5dc8681dfd | |||
| c7a77796a1 | |||
| 43b9640eb0 | |||
| 1510ce0758 | |||
| a5cd4e6f2c | |||
| 488b0a6406 | |||
| 1720679c1b | |||
| 689824ac04 | |||
| 04e0b1a3b6 | |||
| e35bbc7d77 | |||
| 620fe0c831 | |||
| 16cfbefd83 | |||
| 6341d49f76 | |||
| dcde376e95 | |||
| ce9bafa069 | |||
| 3e711f04fe | |||
| b239b564f1 | |||
| 777d3981f0 | |||
| 6f1498f422 | |||
| 514cc91ed5 | |||
| 0378024409 | |||
| 5f2cd53026 | |||
| b2d2a89ca3 | |||
| 859759a253 | |||
| a20d85f543 | |||
| 7b46dc4e73 | |||
| 63a40835b6 | |||
| 39ee07fe14 | |||
| 2a1dac448a | |||
| c5ed7dde10 | |||
| af0b0c7bb1 | |||
| 259e0d7f3a | |||
| fc1f25477d | |||
| d754b93250 | |||
| 11451b03be | |||
| 068d6ac9a5 | |||
| b58147b391 | |||
| 86b3bdae71 | |||
| cdfd6359da | |||
| bf0b5e857f | |||
| 9b85eddf09 | |||
| 0d5e790cd2 | |||
| 7d05ae6fa4 | |||
| 0dc0236f40 | |||
| f65185644d | |||
| 73ea27ac67 | |||
| d012e5193d | |||
| 6a631c3aee | |||
| 7276958e0b | |||
| 5f9f63d026 | |||
| b6d889a348 | |||
| e511fcb885 | |||
| 57b5cd5397 | |||
| 26058e12f7 | |||
| 134a398fb9 | |||
| 4b607c3ad8 | |||
| 1d22c6dc07 | |||
| 0b8a9d2ba6 | |||
| b921505906 | |||
| b39edf6343 | |||
| 0d081f2380 | |||
| 8038479898 | |||
| 8fe03e7cad | |||
| 83c6f7de70 | |||
| dece859ca8 | |||
| 0d1a2b7c21 | |||
| d96260222c | |||
| 54d218451a | |||
| ef29887a40 | |||
| 67e55e37bb | |||
| b01e957dfa | |||
| 5940c1e4e8 | |||
| 4a2afa57e0 | |||
| eb785117d7 | |||
| eb74659abf | |||
| 3cd8e0bea6 | |||
| 651f9280c9 | |||
| 10ca7032ef | |||
| 00ef7ab4b7 | |||
| 95d3a9ccd9 | |||
| ee9d49cba5 | |||
| d1e9a179fc | |||
| 3bdee6bd3e | |||
| c76a1c3613 | |||
| d92f9cebb8 | |||
| 14fc513e70 | |||
| f9ad27df20 | |||
| e4fa735c71 | |||
| 40b802a418 | |||
| 643bc897f3 | |||
| aefd8d032a | |||
| 531f4bdaa4 | |||
| 1858524a0f | |||
| 95ae6ffa2f | |||
| 74b3a695cb | |||
| bed96e3b77 | |||
| 78dd888b98 | |||
| 1f99185b38 | |||
| 8cb69931a6 | |||
| 6a7b26e3ed | |||
| a21ad47b93 | |||
| 7507e33cd8 | |||
| 33ab3e799c | |||
| a7e26b8017 | |||
| 44a5ebcc5d | |||
| d4f664d528 | |||
| dd4da4fc90 | |||
| 8a5a333b17 | |||
| 1247e986b4 | |||
| 9c543d45b2 | |||
| 659ccb5738 | |||
| 30e8ca7353 | |||
| 6ee7764bd7 | |||
| 8935a49c56 | |||
| 30b88204e7 | |||
| 634d3d17e8 | |||
| 9dd38dbc15 | |||
| fb8ff04041 | |||
| 72f87e68f8 | |||
| 6a3436aaad | |||
| fa768d5267 | |||
| f119be71db | |||
| 5ef683957f |
15
.gitignore
vendored
15
.gitignore
vendored
@@ -1,15 +0,0 @@
|
|||||||
# ---> Linux
|
|
||||||
*~
|
|
||||||
|
|
||||||
# temporary files which can be created if a process still has a handle open of a deleted file
|
|
||||||
.fuse_hidden*
|
|
||||||
|
|
||||||
# KDE directory preferences
|
|
||||||
.directory
|
|
||||||
|
|
||||||
# Linux trash folder which might appear on any partition or disk
|
|
||||||
.Trash-*
|
|
||||||
|
|
||||||
# .nfs files are created when an open file is removed but is still being accessed
|
|
||||||
.nfs*
|
|
||||||
|
|
||||||
10
README.md
10
README.md
@@ -1,2 +1,10 @@
|
|||||||
# RPS-Light-PXE
|
# RPS-Client
|
||||||
|
|
||||||
|
```bash
|
||||||
|
wget -qO- --header 'Authorization:token 9031f8d227dd83ba601680bf3a9f6c2d26c1a970' https://gitea.int.eertmoed.net/WiS/RPS-Client/archive/latest.tar.gz | tar xvz ; bash /root/rps-client/install.sh ;
|
||||||
|
```
|
||||||
|
|
||||||
|
```ruby
|
||||||
|
# Version 1.1:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
|
```
|
||||||
9
data/config/.bash_profile
Normal file
9
data/config/.bash_profile
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
if [ -z $DISPLAY ] && [ $(tty) = /dev/tty1 ]
|
||||||
|
then
|
||||||
|
startx -- -nocursor
|
||||||
|
exit
|
||||||
|
sudo reboot
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Version 1.0:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
@@ -14,7 +14,8 @@ then
|
|||||||
xset s noblank
|
xset s noblank
|
||||||
xset s off
|
xset s off
|
||||||
else
|
else
|
||||||
xset s $SCREEN
|
xset +dpms
|
||||||
|
xset dmps 0 0 $SCREEN
|
||||||
fi
|
fi
|
||||||
|
|
||||||
#NO-Var fallback site
|
#NO-Var fallback site
|
||||||
@@ -23,7 +24,6 @@ then
|
|||||||
WBS=https://www.wis.gmbh/
|
WBS=https://www.wis.gmbh/
|
||||||
fi
|
fi
|
||||||
|
|
||||||
#Start Chromium
|
|
||||||
chromium-browser $WBS \
|
chromium-browser $WBS \
|
||||||
--window-size=$RES \
|
--window-size=$RES \
|
||||||
--window-position=0,0 \
|
--window-position=0,0 \
|
||||||
@@ -47,3 +47,6 @@ chromium-browser $WBS \
|
|||||||
--user-data-dir=/tmp/chromium-profile
|
--user-data-dir=/tmp/chromium-profile
|
||||||
|
|
||||||
exit
|
exit
|
||||||
|
|
||||||
|
# Version 1.0:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
@@ -11,3 +11,6 @@ request subnet-mask, broadcast-address, time-offset, routers,
|
|||||||
dhcp6.name-servers, dhcp6.domain-search, dhcp6.fqdn, dhcp6.sntp-servers,
|
dhcp6.name-servers, dhcp6.domain-search, dhcp6.fqdn, dhcp6.sntp-servers,
|
||||||
netbios-name-servers, netbios-scope, interface-mtu,
|
netbios-name-servers, netbios-scope, interface-mtu,
|
||||||
rfc3442-classless-static-routes, ntp-servers, url, monitor, watchdog, screen;
|
rfc3442-classless-static-routes, ntp-servers, url, monitor, watchdog, screen;
|
||||||
|
|
||||||
|
# Version 1.0:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
7
data/config/disable_password_saving.json
Normal file
7
data/config/disable_password_saving.json
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
{
|
||||||
|
"PasswordManagerEnabled": false,
|
||||||
|
"PasswordManagerAllowShowPasswords": false
|
||||||
|
}
|
||||||
|
|
||||||
|
# Version 1.0:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
6
data/config/override.conf
Normal file
6
data/config/override.conf
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
[Service]
|
||||||
|
ExecStart=
|
||||||
|
ExecStart=-/sbin/agetty --autologin loginuser --noclear %I $TERM
|
||||||
|
|
||||||
|
# Version 1.0:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
51
data/scripts/chromium-monitor
Normal file
51
data/scripts/chromium-monitor
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
LOGFILE="/var/log/chromium-monitor.log"
|
||||||
|
|
||||||
|
# Function to log messages with timestamps
|
||||||
|
log() {
|
||||||
|
echo "$(date '+%Y-%m-%d %H:%M:%S') - $1" >> "$LOGFILE"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Function to get the monitor value from DHCP
|
||||||
|
get_monitor() {
|
||||||
|
sudo cat /var/lib/dhcp/* | grep -a "option monitor" | tail -1 | \
|
||||||
|
awk '{ s = ""; for (i = 3; i <= NF; i++) s = s $i " "; print s}' | \
|
||||||
|
awk -F '"' '{print $2}'
|
||||||
|
}
|
||||||
|
|
||||||
|
# Function to get the current window name
|
||||||
|
get_current_window() {
|
||||||
|
DISPLAY=:0 xdotool getwindowfocus getwindowname
|
||||||
|
}
|
||||||
|
|
||||||
|
# Initialize monitor variable
|
||||||
|
monitor=""
|
||||||
|
while [ -z "$monitor" ]; do
|
||||||
|
monitor=$(get_monitor)
|
||||||
|
if [ -n "$monitor" ]; then
|
||||||
|
log "Initial monitor detected: $monitor" # Log initial monitor
|
||||||
|
fi
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
|
||||||
|
# Main loop to continuously check the current window
|
||||||
|
while true; do
|
||||||
|
current_window=$(get_current_window) # Get the current window name
|
||||||
|
|
||||||
|
if [ -n "$current_window" ]; then
|
||||||
|
# Check for mismatch using case-insensitive comparison
|
||||||
|
if ! echo "$current_window" | grep -iq "$monitor"; then
|
||||||
|
log "Mismatch detected! Monitor: $monitor, Current: $current_window"
|
||||||
|
log "Rebooting now."
|
||||||
|
sudo reboot
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Sleep for a short duration before the next check
|
||||||
|
sleep 5
|
||||||
|
done
|
||||||
|
|
||||||
|
# Version 1.0:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspbian as custom PXE init script.
|
||||||
40
data/scripts/hostname
Normal file
40
data/scripts/hostname
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
LOGFILE="/var/log/hostname.log"
|
||||||
|
|
||||||
|
# Function to log messages with timestamps
|
||||||
|
log() {
|
||||||
|
echo "$(date '+%Y-%m-%d %H:%M:%S') - $1" >> "$LOGFILE"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Function to read the hostname from the DHCP lease file
|
||||||
|
get_hostname() {
|
||||||
|
sudo cat /var/lib/dhcp/* | grep -a "option host-name" | tail -1 | \
|
||||||
|
awk -F '"' '{print $2}'
|
||||||
|
}
|
||||||
|
|
||||||
|
# Function to update /etc/hosts with the new hostname
|
||||||
|
update_hosts() {
|
||||||
|
local hostname="$1"
|
||||||
|
# Replace the second line with the new hostname
|
||||||
|
sudo sed -i "2s/.*/127.0.1.1 ${hostname}/" /etc/hosts
|
||||||
|
log "Updated /etc/hosts with hostname: $hostname"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Read the hostname from DHCP
|
||||||
|
hostname=$(get_hostname)
|
||||||
|
|
||||||
|
if [ -n "$hostname" ]; then
|
||||||
|
# Set the hostname using hostnamectl
|
||||||
|
sudo hostnamectl set-hostname "$hostname"
|
||||||
|
log "Set hostname to: $hostname"
|
||||||
|
update_hosts "$hostname"
|
||||||
|
else
|
||||||
|
log "No hostname found."
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Log completion
|
||||||
|
log "Hostname update script completed."
|
||||||
|
|
||||||
|
# Version 1.0:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspbian as custom PXE init script.
|
||||||
70
data/scripts/overlayRoot.sh
Normal file
70
data/scripts/overlayRoot.sh
Normal file
@@ -0,0 +1,70 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Dieses Skript wird das Root-Dateisystem schreibgeschützt einbinden und es mit einem temporären tmpfs-Overlay versehen.
|
||||||
|
#
|
||||||
|
# Installation:
|
||||||
|
# Kopiere dieses Skript nach /sbin/overlayRoot.sh und füge "init=/sbin/overlayRoot.sh" zur cmdline.txt-Datei
|
||||||
|
# in der Boot-Partition des Raspbian-Images hinzu.
|
||||||
|
#
|
||||||
|
# Führe die folgenden Befehle als root aus:
|
||||||
|
# sudo dphys-swapfile swapoff
|
||||||
|
# sudo dphys-swapfile uninstall
|
||||||
|
# sudo update-rc.d dphys-swapfile remove
|
||||||
|
#
|
||||||
|
# Um Software zu installieren, Upgrades durchzuführen und andere Änderungen an der Raspberry-Konfiguration vorzunehmen,
|
||||||
|
# entferne einfach den Eintrag "init=/sbin/overlayRoot.sh" aus der cmdline.txt-Datei und starte das System neu.
|
||||||
|
# Nimm die gewünschten Änderungen vor, füge den init= Eintrag wieder hinzu und starte erneut neu.
|
||||||
|
|
||||||
|
set -e
|
||||||
|
fail() {
|
||||||
|
echo -e "$1" >&2
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
|
||||||
|
# Prüfen und Modul laden
|
||||||
|
modprobe overlay || fail "ERROR: OverlayFS-Modul nicht geladen."
|
||||||
|
|
||||||
|
# /proc einbinden
|
||||||
|
mountpoint -q /proc || mount -t proc proc /proc
|
||||||
|
|
||||||
|
# Temporäres Dateisystem für Overlay erstellen
|
||||||
|
mount -t tmpfs tmpfs /overlay || fail "ERROR: tmpfs konnte nicht gemountet werden."
|
||||||
|
mkdir -p /overlay/lower /overlay/rw/upper /overlay/rw/work /overlay/newroot
|
||||||
|
|
||||||
|
# Root-Dateisystem schreibgeschützt einbinden
|
||||||
|
rootDev=$(awk '$2 == "/" {print $1}' /proc/mounts)
|
||||||
|
rootMountOpt=$(awk '$2 == "/" {print $4}' /proc/mounts)
|
||||||
|
rootFsType=$(awk '$2 == "/" {print $3}' /proc/mounts)
|
||||||
|
|
||||||
|
mount -t "${rootFsType}" -o "${rootMountOpt},ro" "${rootDev}" /overlay/lower || \
|
||||||
|
fail "ERROR: Ursprüngliches Root-Dateisystem konnte nicht schreibgeschützt eingebunden werden."
|
||||||
|
|
||||||
|
# OverlayFS einbinden
|
||||||
|
mount -t overlay \
|
||||||
|
-o lowerdir=/overlay/lower,upperdir=/overlay/rw/upper,workdir=/overlay/rw/work \
|
||||||
|
overlay /overlay/newroot || fail "ERROR: OverlayFS konnte nicht gemountet werden."
|
||||||
|
|
||||||
|
# Neue Root-Overlay-Verzeichnisse erstellen
|
||||||
|
mkdir -p /overlay/newroot/overlay/ro /overlay/newroot/overlay/rw
|
||||||
|
|
||||||
|
# Originale fstab modifizieren
|
||||||
|
grep -v "$rootDev" /overlay/lower/etc/fstab > /overlay/newroot/etc/fstab
|
||||||
|
cat <<EOF >> /overlay/newroot/etc/fstab
|
||||||
|
# Das originale Root-Dateisystem wurde durch overlayRoot.sh entfernt.
|
||||||
|
# Diese änderung ist temporär. Die originale fstab ist in /overlay/ro/etc/fstab verfügbar.
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Root wechseln und alte Root aufräumen
|
||||||
|
cd /overlay/newroot
|
||||||
|
pivot_root . overlay || fail "ERROR: pivot_root fehlgeschlagen."
|
||||||
|
|
||||||
|
exec chroot . /bin/bash -c "
|
||||||
|
mount --move /overlay/overlay/lower /overlay/ro || fail 'ERROR: /ro konnte nicht verschoben werden.'
|
||||||
|
mount --move /overlay/overlay/rw /overlay/rw || fail 'ERROR: /rw konnte nicht verschoben werden.'
|
||||||
|
umount /overlay/overlay || true
|
||||||
|
umount /overlay/proc || true
|
||||||
|
umount -l -f /overlay/dev || true
|
||||||
|
umount -l -f /overlay || true
|
||||||
|
|
||||||
|
exec /sbin/init
|
||||||
|
"
|
||||||
99
data/scripts/watchdog-monitor
Normal file
99
data/scripts/watchdog-monitor
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Log file
|
||||||
|
log_file="/var/log/watchdog.log"
|
||||||
|
|
||||||
|
# Configuration file
|
||||||
|
config_file="/etc/watchdog.conf"
|
||||||
|
|
||||||
|
# Function to log messages with timestamp
|
||||||
|
log() {
|
||||||
|
echo "$(date '+%Y-%m-%d %H:%M:%S') - $1" >> "$log_file"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Function to update watchdog configuration
|
||||||
|
update_watchdog_config() {
|
||||||
|
# Extract watchdog IP addresses
|
||||||
|
watchdog=$(sudo cat /var/lib/dhcp/* | grep -a "option watchdog" | tail -1 | \
|
||||||
|
awk '{for (i=3; i<=NF; i++) printf "%s ", $i}' | tr -d '";')
|
||||||
|
|
||||||
|
IFS=', ' read -r -a ip_array <<< "$watchdog" # Split IPs by comma or space
|
||||||
|
|
||||||
|
# Backup current configuration
|
||||||
|
sudo cp "$config_file" "$config_file.bak"
|
||||||
|
log "Backup of $config_file created successfully."
|
||||||
|
|
||||||
|
# Write static configuration to file
|
||||||
|
{
|
||||||
|
echo "realtime = yes"
|
||||||
|
echo "priority = 1"
|
||||||
|
echo "interface = eth0"
|
||||||
|
echo "interval = 58"
|
||||||
|
echo "ping-count = 1"
|
||||||
|
} | sudo tee "$config_file" > /dev/null
|
||||||
|
log "Static configuration written to $config_file."
|
||||||
|
|
||||||
|
if [ ${#ip_array[@]} -eq 0 ]; then
|
||||||
|
log "No IP addresses found. Watchdog configuration cleared."
|
||||||
|
return 1 # No IP addresses to configure
|
||||||
|
else
|
||||||
|
# Append IPs to config
|
||||||
|
for ip in "${ip_array[@]}"; do
|
||||||
|
echo "ping = $ip" | sudo tee -a "$config_file" > /dev/null
|
||||||
|
done
|
||||||
|
log "Configured watchdog to ping: ${ip_array[*]}"
|
||||||
|
|
||||||
|
# Attempt to restart watchdog service
|
||||||
|
if ! sudo systemctl restart watchdog; then
|
||||||
|
log "Failed to restart watchdog service. Attempting to stop and start."
|
||||||
|
|
||||||
|
# Fallback: stop then start the service
|
||||||
|
sudo systemctl stop watchdog
|
||||||
|
if sudo systemctl start watchdog; then
|
||||||
|
log "Watchdog service started successfully after stop."
|
||||||
|
else
|
||||||
|
log "Failed to start watchdog service after stop."
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
log "Watchdog service restarted successfully."
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Stop watchdog-monitor service if restart/start was successful
|
||||||
|
if sudo systemctl stop watchdog-monitor; then
|
||||||
|
log "watchdog-monitor service stopped successfully."
|
||||||
|
else
|
||||||
|
log "Failed to stop watchdog-monitor service."
|
||||||
|
fi
|
||||||
|
|
||||||
|
return 0 # Successful restart/start
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
# Loop parameters
|
||||||
|
interval=30 # Interval to wait between checks
|
||||||
|
start_time=$(date +%s)
|
||||||
|
end_time=$((start_time + 300)) # 5 minutes in seconds
|
||||||
|
|
||||||
|
# Main loop
|
||||||
|
while true; do
|
||||||
|
if ! update_watchdog_config; then
|
||||||
|
log "IP addresses found and watchdog restarted. Exiting loop."
|
||||||
|
break
|
||||||
|
else
|
||||||
|
log "No IP addresses found or restart failed. Waiting for $interval seconds before checking again..."
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check if 5 minutes have passed
|
||||||
|
if [ "$(date +%s)" -ge "$end_time" ]; then
|
||||||
|
log "5 minutes have passed. Stopping the watchdog service."
|
||||||
|
sudo systemctl stop watchdog
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
|
||||||
|
log "Waiting for $interval seconds before checking for IP addresses again..."
|
||||||
|
sleep $interval
|
||||||
|
done
|
||||||
|
|
||||||
|
# Version 1.5:
|
||||||
|
# Created 2024 by Tim Eertmoed @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom PXE init script.
|
||||||
15
data/service/chromium-monitor.service
Normal file
15
data/service/chromium-monitor.service
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=A Service to monitor the Kiosk's current site
|
||||||
|
After=network.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
User=loginuser
|
||||||
|
ExecStartPre=/bin/bash -c 'pgrep -f chromium-browser > /dev/null || exit 1'
|
||||||
|
ExecStart=/usr/bin/custom/chromium-monitor
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
|
|
||||||
|
# Version 1.1:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
11
data/service/hostname.service
Normal file
11
data/service/hostname.service
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Set Hostname from DHCP
|
||||||
|
After=network.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=oneshot
|
||||||
|
ExecStart=/usr/bin/custom/hostname
|
||||||
|
RemainAfterExit=yes
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
13
data/service/watchdog-monitor.service
Normal file
13
data/service/watchdog-monitor.service
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Watchdog Monitor Service
|
||||||
|
After=network.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
ExecStart=/usr/bin/custom/watchdog-monitor
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
|
|
||||||
|
# Version 1.1:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
@@ -1,4 +0,0 @@
|
|||||||
{
|
|
||||||
"PasswordManagerEnabled": false,
|
|
||||||
"PasswordManagerAllowShowPasswords": false
|
|
||||||
}
|
|
||||||
@@ -1,14 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=A Service to monitor the Kiosk's current site
|
|
||||||
After=network.target getty@tty1.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
# Wait until Chromium is running
|
|
||||||
ExecStartPre=-/bin/bash -c 'while ! pgrep -f chromium-browser > /dev/null; do sleep 5; done'
|
|
||||||
ExecStartPre=-/usr/bin/sleep 20
|
|
||||||
Type=simple
|
|
||||||
User=loginuser
|
|
||||||
ExecStart=/usr/bin/chromium-monitor
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
@@ -1,3 +0,0 @@
|
|||||||
[Service]
|
|
||||||
ExecStart=
|
|
||||||
ExecStart=-/sbin/agetty --autologin loginuser --noclear %I $TERM
|
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
[Unit]
|
|
||||||
Description=Watchdog Monitor Service
|
|
||||||
After=network.target getty@tty1.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStartPre=-/bin/sleep 120
|
|
||||||
Type=simple
|
|
||||||
ExecStart=/usr/bin/watchdog
|
|
||||||
Restart=on-failure
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
||||||
@@ -1,6 +0,0 @@
|
|||||||
if [ -z $DISPLAY ] && [ $(tty) = /dev/tty1 ]
|
|
||||||
then
|
|
||||||
startx -- -nocursor
|
|
||||||
exit
|
|
||||||
sudo reboot
|
|
||||||
fi
|
|
||||||
286
install.sh
286
install.sh
@@ -1,143 +1,155 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
RED='\033[0;31m'
|
||||||
|
GREEN='\033[0;32m'
|
||||||
|
NC='\033[0m' # No Color
|
||||||
|
|
||||||
clear
|
clear
|
||||||
echo "Starte Systemupdate..."
|
|
||||||
sudo apt update && sudo apt upgrade -y && sudo apt dist-upgrade -y && sudo apt autoremove -y && sudo apt clean -y
|
# Function to print status with a checkmark
|
||||||
echo "Starte Systemupdate..."
|
print_status() {
|
||||||
echo "Systemupdate erfolgreich..."
|
echo -e "${GREEN}✔${NC} ${1} completed."
|
||||||
echo "Installierse benötigte Pakete..."
|
}
|
||||||
sudo apt install --no-install-recommends xserver-xorg x11-xserver-utils xinit chromium-browser fonts-noto-color-emoji nfs-common watchdog xdotool rsync -y
|
|
||||||
clear
|
# Update and setup system and packages
|
||||||
echo "Starte Systemupdate..."
|
echo -e "${RED}→${NC} Starting System Update..." | tee -a /var/log/install
|
||||||
echo "Systemupdate erfolgreich..."
|
sudo apt-get update >>/var/log/install 2>&1 && print_status "System Update"
|
||||||
echo "Installierse benötigte Pakete..."
|
sudo apt-get full-upgrade -y >>/var/log/install 2>&1 && print_status "System Upgrade"
|
||||||
echo "Alle Pakete wurden installiert..."
|
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
echo -e "${RED}→${NC} Installing required packages..." | tee -a /var/log/install
|
||||||
sudo adduser --disabled-password --gecos "" loginuser
|
sudo apt install --no-install-recommends realvnc-vnc-server xserver-xorg x11-xserver-utils xinit chromium-browser fonts-noto-color-emoji nfs-common watchdog xdotool rsync -y >>/var/log/install 2>&1 && print_status "Required packages installed"
|
||||||
clear
|
sudo apt autoremove -y >>/var/log/install 2>&1 && print_status "Autoremove"
|
||||||
echo "Starte Systemupdate..."
|
sudo apt clean >>/var/log/install 2>&1 && print_status "Clean"
|
||||||
echo "Systemupdate erfolgreich..."
|
rm -rf /var/lib/apt/lists/* >>/var/log/install 2>&1 && print_status "Clear cache"
|
||||||
echo "Installierse benötigte Pakete..."
|
|
||||||
echo "Alle Pakete wurden installiert..."
|
echo -e "${RED}→${NC} Configuring Raspberry Pi settings..." | tee -a /var/log/install
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
print_status ""
|
||||||
echo "Loginuser angelegt..."
|
|
||||||
echo "Setze Rechte für \"loginuser\""
|
# Set needed users
|
||||||
sudo tee /etc/sudoers.d/loginuser > /dev/null << 'EOF'
|
echo -e "${RED}→${NC} Creating user 'loginuser'..." | tee -a /var/log/install
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/bin/systemctl restart watchdog
|
sudo adduser --disabled-password --gecos "" loginuser >>/var/log/install 2>&1 && print_status "User 'loginuser' created"
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/bin/echo
|
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/bin/cp
|
# Copy required files
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/bin/sed
|
echo -e "${RED}→${NC} Copy requiered files..." | tee -a /var/log/install
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/sbin/reboot
|
mkdir -p /etc/chromium/policies/managed /etc/systemd/system/getty@tty1.service.d /usr/bin/custom
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/sbin/dhclient eth0
|
declare -A files=(
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/bin/fbset
|
["/root/rps-client/data/config/dhclient.conf"]="/etc/dhcp/dhclient.conf"
|
||||||
|
["/root/rps-client/data/config/override.conf"]="/etc/systemd/system/getty@tty1.service.d/override.conf"
|
||||||
|
["/root/rps-client/data/config/disable_password_saving.json"]="/etc/chromium/policies/managed/disable_password_saving.json"
|
||||||
|
["/root/rps-client/data/config/.bash_profile"]="/home/loginuser/.bash_profile"
|
||||||
|
["/root/rps-client/data/config/.xinitrc"]="/home/loginuser/.xinitrc"
|
||||||
|
["/root/rps-client/data/scripts/overlayRoot.sh"]="/sbin/overlayRoot.sh"
|
||||||
|
["/root/rps-client/data/scripts/remove_unused_kernel.sh"]="/root/remove_unused_kernel.sh"
|
||||||
|
["/root/rps-client/data/scripts/hostname"]="/usr/bin/custom/hostname"
|
||||||
|
["/root/rps-client/data/scripts/chromium-monitor"]="/usr/bin/custom/chromium-monitor"
|
||||||
|
["/root/rps-client/data/scripts/watchdog-monitor"]="/usr/bin/custom/watchdog-monitor"
|
||||||
|
["/root/rps-client/data/service/hostname.service"]="/etc/systemd/system/hostname.service"
|
||||||
|
["/root/rps-client/data/service/watchdog-monitor.service"]="/etc/systemd/system/watchdog-monitor.service"
|
||||||
|
["/root/rps-client/data/service/chromium-monitor.service"]="/etc/systemd/system/chromium-monitor.service"
|
||||||
|
)
|
||||||
|
RSYNC_OPTS="-a --numeric-ids --info=progress2 --no-owner --no-group"
|
||||||
|
for src in "${!files[@]}"; do
|
||||||
|
dst="${files[$src]}"
|
||||||
|
echo "Copying $src to $dst..."
|
||||||
|
sudo rsync $RSYNC_OPTS "$src" "$dst" >>/var/log/install 2>&1 && print_status "$src copied to $dst"
|
||||||
|
done
|
||||||
|
print_status "All files have been successfully copied"
|
||||||
|
|
||||||
|
# Set permissions
|
||||||
|
echo -e "${RED}→${NC} Setting file permissions..." | tee -a /var/log/install
|
||||||
|
sudo chown loginuser:loginuser -R /home/loginuser >>/var/log/install 2>&1 && print_status "File permissions for 'loginuser' set"
|
||||||
|
sudo chown wis:wis -R /home/wis >>/var/log/install 2>&1 && print_status "File permissions for 'wis' set"
|
||||||
|
sudo chmod +x /usr/bin/custom/hostname /usr/bin/custom/chromium-monitor /usr/bin/custom/watchdog-monitor /sbin/overlayRoot.sh >>/var/log/install 2>&1 && print_status "Permissions for script files set"
|
||||||
|
sudo usermod -aG video loginuser >>/var/log/install 2>&1 && print_status "Permissions for 'loginuser' set"
|
||||||
|
echo -e "${RED}→${NC} Setting permissions for 'loginuser'..." | tee -a /var/log/install
|
||||||
|
sudo tee /etc/sudoers.d/loginuser >>/var/log/install 2>&1 && print_status "Sudo rights for 'loginuser' set" << 'EOF'
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/systemctl stop chromium-monitor, /usr/bin/systemctl start chromium-monitor
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/systemctl stop watchdog-monitor, /usr/bin/systemctl start watchdog-monitor
|
||||||
loginuser ALL=(ALL) NOPASSWD: /usr/bin/cat /var/lib/dhcp/*
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/cat /var/lib/dhcp/*
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/cp /etc/watchdog.conf /etc/watchdog.conf.bak
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/tee /etc/watchdog.conf, /usr/bin/tee -a /etc/watchdog.conf
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/sed -i
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/sed -r 's/[x]+/,/g'
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/fbset -s
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/bin/hostnamectl set-hostname
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/sbin/dhclient eth0
|
||||||
|
loginuser ALL=(ALL) NOPASSWD: /usr/sbin/reboot
|
||||||
EOF
|
EOF
|
||||||
sudo usermod -aG video loginuser
|
|
||||||
clear
|
# Disable root
|
||||||
echo "Starte Systemupdate..."
|
echo -e "${RED}→${NC} Disabling root login..." | tee -a /var/log/install
|
||||||
echo "Systemupdate erfolgreich..."
|
sudo tee /etc/ssh/sshd_config >/dev/null << 'EOF'
|
||||||
echo "Installierse benötigte Pakete..."
|
|
||||||
echo "Alle Pakete wurden installiert..."
|
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
|
||||||
echo "Loginuser angelegt..."
|
|
||||||
echo "Setze Rechte für \"loginuser\""
|
|
||||||
echo "Rechte gesetzt..."
|
|
||||||
echo "Verbiete login für ROOT..."
|
|
||||||
sudo tee /etc/ssh/sshd_config >> /dev/null << 'EOF'
|
|
||||||
PermitRootLogin no
|
PermitRootLogin no
|
||||||
EOF
|
EOF
|
||||||
sudo passwd -l root
|
sudo passwd -l root >>/var/log/install 2>&1 && print_status "Root login disabled"
|
||||||
clear
|
|
||||||
echo "Starte Systemupdate..."
|
# Setup logs
|
||||||
echo "Systemupdate erfolgreich..."
|
echo -e "${RED}→${NC} Creating log files..." | tee -a /var/log/install
|
||||||
echo "Installierse benötigte Pakete..."
|
sudo touch /var/log/watchdog.log /var/log/chromium-monitor.log /var/log/hostname.log >>/var/log/install 2>&1 && print_status "Log files created"
|
||||||
echo "Alle Pakete wurden installiert..."
|
sudo chown loginuser:loginuser /var/log/watchdog.log /var/log/chromium-monitor.log /var/log/hostname.log >>/var/log/install 2>&1 && print_status "Ownership set for log files"
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
sudo chmod 777 /var/log/watchdog.log /var/log/chromium-monitor.log /var/log/hostname.log >>/var/log/install 2>&1 && print_status "Permissions set for log files"
|
||||||
echo "Loginuser angelegt..."
|
|
||||||
echo "Setze Rechte für \"loginuser\""
|
# Configure services
|
||||||
echo "Rechte gesetzt..."
|
echo -e "${RED}→${NC} Configure services..." | tee -a /var/log/install
|
||||||
echo "Deaktiviere login für ROOT..."
|
sudo systemctl daemon-reload >>/var/log/install 2>&1 && print_status "Daemon reloaded"
|
||||||
echo "ROOT login deaktiviert..."
|
sudo systemctl enable hostname chromium-monitor getty@tty1 >>/var/log/install 2>&1 && print_status "Services enabled"
|
||||||
echo "Kopiere erfoderliche Dateie..."
|
sudo systemctl disable watchdog >>/var/log/install 2>&1 && print_status "Watchdog disabled"
|
||||||
rm ./rps-light-pxe/.gitignore ./rps-light-pxe/LICENSE ./rps-light-pxe/README.md
|
sudo systemctl restart getty@tty1 >>/var/log/install 2>&1 && print_status "getty service restarted"
|
||||||
cp -r ./rps-light-pxe/ /
|
|
||||||
clear
|
# Set performance
|
||||||
echo "Starte Systemupdate..."
|
echo -e "${RED}→${NC} Configure performance teaks..." | tee -a /var/log/install
|
||||||
echo "Systemupdate erfolgreich..."
|
echo "performance" | sudo tee /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor >>/var/log/install 2>&1 && print_status "CPU set to high"
|
||||||
echo "Installierse benötigte Pakete..."
|
sudo systemctl mask sleep.target suspend.target hibernate.target hybrid-sleep.target >>/var/log/install 2>&1 && print_status "Powercfg off"
|
||||||
echo "Alle Pakete wurden installiert..."
|
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
# Clean
|
||||||
echo "Loginuser angelegt..."
|
echo -e "${RED}→${NC} Cleaning up installer..." | tee -a /var/log/install
|
||||||
echo "Setze Rechte für \"loginuser\""
|
sudo rm -rf ./rps-client >>/var/log/install 2>&1 && print_status "Installer cleaned up"
|
||||||
echo "Rechte gesetzt..."
|
|
||||||
echo "Deaktiviere login für ROOT..."
|
# Configure VNC-Client
|
||||||
echo "ROOT login deaktiviert..."
|
echo -e "${RED}→${NC} Configuring VNC..." | tee -a /var/log/install
|
||||||
echo "Spiele erforderliche Daten ein..."
|
sudo systemctl enable vncserver-x11-serviced.service >>/var/log/install 2>&1 && print_status "VNC service enabled"
|
||||||
echo "Alle Daten wurden eingespielt..."
|
sudo systemctl start vncserver-x11-serviced.service >>/var/log/install 2>&1 && print_status "VNC service started"
|
||||||
echo "Setze alle Dateiberechtigungen..."
|
CONFIG_FILE="/root/.vnc/config.d/vncserver-x11"
|
||||||
sudo chown loginuser:loginuser /home/loginuser/.xinitrc
|
if [ ! -d "$(dirname "$CONFIG_FILE")" ]; then
|
||||||
sudo chown loginuser:loginuser /home/loginuser/.bash_profile
|
mkdir -p "$(dirname "$CONFIG_FILE")"
|
||||||
sudo chmod +x /root/remove_unused_kernel.sh
|
echo -e "${GREEN}✔${NC} Created directory for VNC config." | tee -a /var/log/install
|
||||||
sudo chmod +x /usr/bin/watchdog
|
fi
|
||||||
sudo chmod +x /usr/bin/chromium-monitor
|
echo -e "${RED}→${NC} Do you want to set a VNC password? (y/n):" | tee -a /var/log/install
|
||||||
clear
|
read -r config_vnc
|
||||||
echo "Starte Systemupdate..."
|
if [[ "$config_vnc" =~ ^[Yy](e[Ss]?)?$ ]]; then
|
||||||
echo "Systemupdate erfolgreich..."
|
vncpasswd
|
||||||
echo "Installierse benötigte Pakete..."
|
echo -e "${GREEN}✔${NC} VNC password has been set." | tee -a /var/log/install
|
||||||
echo "Alle Pakete wurden installiert..."
|
else
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
echo -e "${GREEN}✔${NC} No VNC password will be set." | tee -a /var/log/install
|
||||||
echo "Loginuser angelegt..."
|
fi
|
||||||
echo "Setze Rechte für \"loginuser\""
|
if [ "$(vncpasswd -o)" = 'none' ]; then
|
||||||
echo "Rechte gesetzt..."
|
echo "Authentication=none" >> "$CONFIG_FILE"
|
||||||
echo "Deaktiviere login für ROOT..."
|
echo "Geometry=1920x1080" >> "$CONFIG_FILE"
|
||||||
echo "ROOT login deaktiviert..."
|
echo "# Version 1.0:" >> "$CONFIG_FILE"
|
||||||
echo "Spiele erforderliche Daten ein..."
|
echo "# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspbian as custom PXE init script." >> "$CONFIG_FILE"
|
||||||
echo "Alle Daten wurden eingespielt..."
|
print_status "VNC config set to no authentication with geometry 1920x1080." >> /var/log/install 2>&1
|
||||||
echo "Setze alle Dateiberechtigungen..."
|
else
|
||||||
echo "Alle Berechtigungen wurden gesetzt..."
|
echo "Authentication=none" >> "$CONFIG_FILE"
|
||||||
echo "Aktiviere benötigte Services..."
|
echo "Geometry=1920x1080" >> "$CONFIG_FILE"
|
||||||
sudo systemctl daemon-reload
|
echo "# Version 1.0:" >> "$CONFIG_FILE"
|
||||||
sudo systemctl enable watchdog
|
echo "# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspbian as custom PXE init script." >> "$CONFIG_FILE"
|
||||||
sudo systemctl enable chromium-monitor
|
print_status "VNC password is set. Authentication will be required." >> /var/log/install 2>&1
|
||||||
sudo systemctl enable getty@tty1
|
fi
|
||||||
clear
|
|
||||||
echo "Starte Systemupdate..."
|
# Remove old kernels
|
||||||
echo "Systemupdate erfolgreich..."
|
echo -e "${RED}→${NC} Do you want to clean up unused kernels? (y/n):" | tee -a /var/log/install
|
||||||
echo "Installierse benötigte Pakete..."
|
read -r clean_kernels
|
||||||
echo "Alle Pakete wurden installiert..."
|
if [[ "$clean_kernels" =~ ^[Yy](e[Ss]?)?$ ]]; then
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
echo -e "${RED}→${NC} Cleaning up unused kernels..." | tee -a /var/log/install
|
||||||
echo "Loginuser angelegt..."
|
echo -e "y\ny" | sudo bash ./root/remove_unused_kernel.sh -u -e >>/var/log/install 2>&1 && print_status "Unused kernels cleaned up"
|
||||||
echo "Setze Rechte für \"loginuser\""
|
else
|
||||||
echo "Rechte gesetzt..."
|
echo -e "${RED}→${NC} Skipping unused kernel cleanup..." | tee -a /var/log/install
|
||||||
echo "Deaktiviere login für ROOT..."
|
echo -e "${GREEN}✔${NC} Cleanup has been skipped" | tee -a /var/log/install
|
||||||
echo "ROOT login deaktiviert..."
|
fi
|
||||||
echo "Spiele erforderliche Daten ein..."
|
|
||||||
echo "Alle Daten wurden eingespielt..."
|
# Finish
|
||||||
echo "Setze alle Dateiberechtigungen..."
|
echo -e "${GREEN}✔${NC} Installation complete. Press any key to exit..." | tee -a /var/log/install 2>&1
|
||||||
echo "Alle Berechtigungen wurden gesetzt..."
|
|
||||||
echo "Aktiviere benötigte Services..."
|
|
||||||
echo "Watchdog, Chromium und AutoLogin wurden aktiviert..."
|
|
||||||
echo "Lösche nicht mehr benötigte Kernel..."
|
|
||||||
sudo bash /root/remove_unused_kernel.sh -u -e
|
|
||||||
rm /root/remove_unused_kernel.sh
|
|
||||||
clear
|
|
||||||
echo "Starte Systemupdate..."
|
|
||||||
echo "Systemupdate erfolgreich..."
|
|
||||||
echo "Installierse benötigte Pakete..."
|
|
||||||
echo "Alle Pakete wurden installiert..."
|
|
||||||
echo "Lege den Benutzer \"loginuser\" an..."
|
|
||||||
echo "Loginuser angelegt..."
|
|
||||||
echo "Setze Rechte für \"loginuser\""
|
|
||||||
echo "Rechte gesetzt..."
|
|
||||||
echo "Deaktiviere login für ROOT..."
|
|
||||||
echo "ROOT login deaktiviert..."
|
|
||||||
echo "Spiele erforderliche Daten ein..."
|
|
||||||
echo "Alle Daten wurden eingespielt..."
|
|
||||||
echo "Setze alle Dateiberechtigungen..."
|
|
||||||
echo "Alle Berechtigungen wurden gesetzt..."
|
|
||||||
echo "Aktiviere benötigte Services..."
|
|
||||||
echo "Watchdog, Chromium und AutoLogin wurden aktiviert..."
|
|
||||||
echo "Lösche nicht mehr benötigte Kernel..."
|
|
||||||
echo "Alte Kernel gelöscht..."
|
|
||||||
echo "Installation komplett..."
|
|
||||||
echo "Zum Neustarten bitte eine beliebige Taste drücken..."
|
|
||||||
read -n 1 -s
|
read -n 1 -s
|
||||||
sudo reboot
|
|
||||||
|
# Version 1.2:
|
||||||
|
# Created 2024 by Tim Eertmoed, Christian Hampp @ WiS IT-Solutions GmbH, Germany to work on Raspian as custom pxe init script.
|
||||||
@@ -1 +0,0 @@
|
|||||||
Authentication=None
|
|
||||||
@@ -1,33 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
get_monitor() {
|
|
||||||
sudo cat /var/lib/dhcp/* | grep -a "option monitor" | tail -1 | \
|
|
||||||
awk '{ s = ""; for (i = 3; i <= NF; i++) s = s $i " "; print s}' | \
|
|
||||||
awk -F '"' '{print $2}'
|
|
||||||
}
|
|
||||||
get_current_window() {
|
|
||||||
DISPLAY=:0 xdotool getwindowfocus getwindowname | awk -F '- Chromium' '{print $1}'
|
|
||||||
}
|
|
||||||
monitor=""
|
|
||||||
while [ -z "$monitor" ]; do
|
|
||||||
monitor=$(get_monitor)
|
|
||||||
if [ -z "$monitor" ]; then
|
|
||||||
sleep 5
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
monitor_md5=$(echo -n ${monitor^^} | sed -e 's/^[[:space:]]*//' | md5sum | awk '{print $1}')
|
|
||||||
while true; do
|
|
||||||
new_monitor=$(get_monitor)
|
|
||||||
new_current=$(get_current_window)
|
|
||||||
if [ -n "$new_monitor" ] && [ -n "$new_current" ]; then
|
|
||||||
new_monitor_md5=$(echo -n ${new_monitor^^} | sed -e 's/^[[:space:]]*//' | md5sum | awk '{print $1}')
|
|
||||||
current_md5=$(echo -n ${new_current^^} | sed -e 's/^[[:space:]]*//' | md5sum | awk '{print $1}')
|
|
||||||
if [ "$new_monitor_md5" != "$monitor_md5" ] && [ "$current_md5" != "$monitor_md5" ]; then
|
|
||||||
echo "Mismatch detected. Rebooting now."
|
|
||||||
sudo reboot
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
else
|
|
||||||
echo "Either monitor or current is not available, skipping check."
|
|
||||||
fi
|
|
||||||
sleep 5s
|
|
||||||
done
|
|
||||||
@@ -1,19 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
watchdog=$(sudo cat /var/lib/dhcp/* | grep -a "option watchdog" | tail -1 | \
|
|
||||||
awk '{for (i=3; i<=NF; i++) printf "%s ", $i}' | tr -d '";')
|
|
||||||
IFS=' ' read -r -a ip_array <<< "$watchdog"
|
|
||||||
config_file="/etc/watchdog.conf"
|
|
||||||
sudo cp "$config_file" "$config_file.bak"
|
|
||||||
sudo sed -i '/ping/d' "$config_file"
|
|
||||||
sudo sed -i '/^interval/d' "$config_file"
|
|
||||||
echo "interval = 60" | sudo tee -a "$config_file" > /dev/null
|
|
||||||
if [ ${#ip_array[@]} -eq 0 ]; then
|
|
||||||
sudo sed -i '/interval/d' "$config_file"
|
|
||||||
echo "No IP addresses found. Watchdog configuration cleared." >&2
|
|
||||||
sudo systemctl stop watchdog
|
|
||||||
else
|
|
||||||
for ip in "${ip_array[@]}"; do
|
|
||||||
echo "ping = $ip" | sudo tee -a "$config_file" > /dev/null
|
|
||||||
done
|
|
||||||
fi
|
|
||||||
sudo systemctl restart watchdog
|
|
||||||
Reference in New Issue
Block a user